All my current bug bounty knowledge is gone.
Here's how I get it back and make $100k in the first year:
First, I've got to learn the basics. For this, I will make sure I understand at a high level how the components I'm working with function.
I'll need to understand...
🎉 Announcing ⇧Shift - The Cursor of Hacking
@Rhynorater and I have been cooking up an awesome AI hacking tool and releasing it to beta testers starting today.
⇧ Shift is a Caido plugin that makes hacking faster and easier so you can make more money in less time.
Read on 👇
Company: "Our APIs are secured with OAuth2, JWT rotation, IP whitelisting, and rate-limiting."
Employee: "Hey AI , this error won’t go away. Here’s our full .env file."
Stop sharing your date with LLMs !
Ever felt lost inside a proxy tool?
This video changes that.
I broke down @CaidoIO from install to exploitation, showing you exactly how to set up your workspace, intercept traffic, replay requests, automate tasks, and take full control with plugins — all tailored for bug…
🚀New plugin in the Caido Store!
Introducing "Compare" by @amrelsagaei
Add a pair of requests or responses and display a side-by-side view with visual differences highlighted.
Check out more details: github.com/amrelsagaei/Co…
Hackers,
To make our pricing fairer worldwide, we’re trying out localized pricing.
We’re starting with Brazil 🇧🇷, with Individual plan prices dropping by about 50%.
💸 Monthly: ~110 BRL → 55 BRL
💸 Yearly: ~1,100 BRL → 550 BRL
Which country should we do next?…
1/ An investigation into how Greavys (Malone Iam), Wiz (Veer Chetal), and Box (Jeandiel Serrano) stole $243M from a single person last month in a highly sophisticated social engineering attack and my efforts which have helped lead to multiple arrests and millions frozen.
Need an all-in-one OSINT toolbox? 🕵️♂️ This page brings together search engines, map tools, email & people lookups, darknet resources, and more. Perfect for investigators and researchers. start.me/p/L1rEYQ/osint…
OSINT TIP #336🔥
DeepFind.Me designed for digital investigations. It offers features like username searches, geolocation by photo, metadata extraction, subdomain/WHOIS/DNS lookups, and file encryption/decryption.
@btr1pathi 👏
#OSINT
Struggling to find IDORs?
Many stop at simple GET requests and miss deeper bugs.
In this video, @NahamSec introduces you to IDORs including what they are, where you can find them and how to exploit them.
Watch now to level up your IDOR hunting 👇
youtube.com/watch?v=bCUqio…
I found a Two vulnerabilities.
1. Mass Assignment that allowed me to escalate my privilege and become admin
2. An IDOR
on a locall application. Here i wrote about them, in case you may want to read it.
Blog post link:
blog.koalasec.co/hunting-vulner…
🚨 You won’t believe how much I made off this Microsoft bounty…
Full story and POC here 👉 powershellforhackers.com/blog/#/post/Ps…
This bug exposed:
📧 Email addresses of package owners
🌐 Out-of-band callbacks for data exfil
💥 IP, personal names and addresses, internal system info
225 Followers 1 FollowingThe official Twitter account for Hacking the Cloud, the open-source encyclopedia of offensive security techniques in the cloud. Created by @frichette_n
6K Followers 2K FollowingStaff Security Researcher @datadoghq | DEF CON/Black Hat main stage speaker | he/him | OSCP OSWE | Tweets are my own | Created https://t.co/QGWMJjv9pc
11K Followers 5 Following#1 - Cybersecurity blogging community curating knowledge from wonderful & insightful infosec writers! Join the club right now. 🚀
2K Followers 339 FollowingReverse engineering, soldering, programming, digital forensics & random stuff | Director @ Kaspersky GReAT | Tweets are my own
3K Followers 124 Followingcybersecurity enthusiast, author. speaker, mathematician. Love my wife and kids. Author of MD MZ, MalWild and Maldev for Ethical Hackers (2022-2024) books.
686 Followers 9 FollowingAny man that can stand there and even watch yet alone justify killing children is no man at all, that is a inhumane monster.
Partner @ https://t.co/pPMXFKr0iJ
13K Followers 508 FollowingI don't know how to search on Google so I do research on my own and tweet about it. Hacking as a life style
https://t.co/a05mevChzu
5K Followers 714 Following🌈 Writer of code, creator of stuff, follower of Jesus
👾 I mostly tweet unfunny programming jokes, and tech news you heard 2 weeks ago
🌍 Thankful to be here
769 Followers 20 Following- Archiving tools for League of Legends, nHentai and Twitch.
(Dodge tracker, username, chat history etc)
- Reverse Email/Phone lookup tools
8K Followers 132 FollowingWe are a hi-tech company focusing on binary software analysis. Our main products are IDA Pro and the Hex-Rays Decompiler.
Discourse: https://community.hex-rays
14K Followers 916 FollowingWindows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses! 🚀 #WindowsInternals #TrainSec
83K Followers 16 FollowingTrend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
8K Followers 280 FollowingOS/systems engineer. Worked on WinDbg for a while. I write about low level tech sometimes.
On bluesky: @timdbg.com
On mastodon/fediverse: @[email protected]
13K Followers 1 FollowingOSINT-powered tools for email and phone number investigations.
Telegram: https://t.co/wzX59rY4LS
Linkedin: https://t.co/ivbM2gkKnq
67K Followers 403 Following➡️Hacker - Helper - Human ⬅️ . . . Also Author. Speaker & Scientific Hooligan! A bona fide teachable moment for hire! he/him
37K Followers 2K Following20+ yrs in Infosec. Malware Influencer. I turn Malware into Art and Music. Art @MalwareArt. 4x Pwnie Nominee. 𝕍𝕏. GameDev. Autistic.
18K Followers 555 Following🇺🇸 US-Based 🇺🇸 PCB Assembly, Electronics Prototyping, and PCB Design for Small Business | https://t.co/qCzYnfqEug | War Veteran Owned #USMC #BadgeLife
No recent Favorites. New Favorites will appear here.